to be part of the cybersecurity threat monitoring and analysis team, within the Cybersecurity and Data Governance Division... operations and threat analysis, cybersecurity threat monitoring (OT and IT systems), threat hunting, logs review, network...
candidates to be part of the cybersecurity threat monitoring and analysis team, within the Cybersecurity and Data Governance... operations and threat analysis, cybersecurity threat monitoring (OT and IT systems), threat hunting, logs review, network...
) team. Oversee 24/7 monitoring, incident handling, and threat intelligence analysis. Foster a culture of continuous... such as EnCase, FTK, X-Ways, Sleuthkit, UFED. Perform log analysis locally and via SIEM/log aggregation tool. Hunt threat actors in...
collection and collaborative analysis of security accreditation reports, threat models, documented security controls..., and procedures to understand the threat landscape and to ensure that security monitoring content remains relevant and effective...